PlugX Malware, Oyster Backdoor & NPM Threats – 09/27/2025

Today’s intelligence digest highlights a significant escalation in nation-state activity, with a China-linked campaign deploying PlugX and Bookworm malware against telecommunications sectors in Asia. Concurrently, a malvertising campaign is distributing the Oyster backdoor via fake Microsoft Teams installers to gain initial corporate access. We also cover an emerging supply chain threat involving a malicious backdoor in an NPM package. This is the critical information your organization needs to know today.

Top 5 Critical Security Alerts

  • Fake Microsoft Teams installers push Oyster malware via malvertising : Attackers are using malicious ads for fake Microsoft Teams installers to deploy the Oyster backdoor, gaining initial access to corporate networks. Read more
  • China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks : A China-linked threat actor is actively targeting telecommunications and manufacturing sectors in Asia with new variants of PlugX and Bookworm malware. Read more
  • The Postmark backdoor that’s downloading emails : A malicious backdoor has been discovered in an NPM package, designed to compromise systems and exfiltrate user emails, highlighting supply chain risks. Read more
  • Hunt for RedNovember: Beijing hacked critical orgs in year-long snooping campaign : A newly detailed report outlines a year-long espionage campaign by a Beijing-linked group, RedNovember, that targeted critical organizations for data theft. Read more
  • Dutch teens arrested for trying to spy on Europol for Russia : Two teenagers in the Netherlands have been arrested for allegedly using hacking devices to conduct espionage against the European Union Agency for Law Enforcement Cooperation (Europol) on behalf of Russia. Read more

Threat Intelligence

  • Fake Microsoft Teams installers push Oyster malware via malvertising : Attackers are using malicious ads for fake Microsoft Teams installers to deploy the Oyster backdoor, gaining initial access to corporate networks. Read more
  • China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks : A China-linked threat actor is actively targeting telecommunications and manufacturing sectors in Asia with new variants of PlugX and Bookworm malware. Read more
  • The Postmark backdoor that’s downloading emails : A malicious backdoor has been discovered in an NPM package, designed to compromise systems and exfiltrate user emails, highlighting supply chain risks. Read more
  • Hunt for RedNovember: Beijing hacked critical orgs in year-long snooping campaign : A newly detailed report outlines a year-long espionage campaign by a Beijing-linked group, RedNovember, that targeted critical organizations for data theft. Read more

Security Breaches & Incidents

  • Dutch teens arrested for trying to spy on Europol for Russia : Two teenagers in the Netherlands have been arrested for allegedly using hacking devices to conduct espionage against the European Union Agency for Law Enforcement Cooperation (Europol) on behalf of Russia. Read more

Security Tools & Best Practices

  • SSH3: Faster and rich secure shell using HTTP/3 : A new proposal, SSH3, leverages the performance and features of HTTP/3 to offer a faster, more robust, and more feature-rich secure shell experience. Read more

Emerging Security Technologies

  • Microsoft’s VibeVoice is a new AI podcast model that might generate spontaneous singing : Microsoft has developed VibeVoice, an AI model capable of generating long-form, multi-speaker conversations, raising potential concerns for sophisticated audio deepfakes. Read more
  • Anthropic settles landmark AI copyright lawsuit for at least $1.5 billion : Anthropic’s $1.5 billion settlement with authors and publishers could establish new legal precedents and risks for training AI models on copyrighted material. Read more
  • OpenAI says top AI models are reaching expert territory on real-world knowledge work : OpenAI’s new benchmark suggests that top-tier AI models are performing at expert levels, indicating rapidly advancing capabilities that could be used for both defensive and offensive cyber operations. Read more

YOU MIGHT ALSO LIKE